Skip to content

Commit

Permalink
Changed env parameters to be created in SSM and as a secret
Browse files Browse the repository at this point in the history
Also added missing ones
  • Loading branch information
yusu-banana committed Jan 2, 2024
1 parent a04511d commit 7d15167
Show file tree
Hide file tree
Showing 3 changed files with 83 additions and 14 deletions.
23 changes: 19 additions & 4 deletions terraform/ecs.tf
Original file line number Diff line number Diff line change
Expand Up @@ -92,11 +92,26 @@ resource "aws_ecs_task_definition" "ecs_task_definition" {
awslogs-stream-prefix : "twiggy"
}
},

environment : [
secrets : [
{
"name" : "DISCORD_TOKEN",
"valueFrom" : aws_ssm_parameter.ssm_parameter_discord_token.arn
},
{
"name" : "ITAD_TOKEN",
"valueFrom" : aws_ssm_parameter.ssm_parameter_itad_token.arn
},
{
"name" : "TWITCH_SECRET",
"valueFrom" : aws_ssm_parameter.ssm_parameter_twitch_secret.arn
},
{
"name" : "TWITCH_CLIENT_ID",
"valueFrom" : aws_ssm_parameter.ssm_parameter_twitch_client_id.arn
},
{
name : "PRODUCTION"
value : "1"
"name" : "OPEN_WEATHER_TOKEN",
"valueFrom" : aws_ssm_parameter.ssm_parameter_open_weather_token.arn
}
]
}
Expand Down
20 changes: 10 additions & 10 deletions terraform/iam.tf
Original file line number Diff line number Diff line change
Expand Up @@ -19,29 +19,29 @@ resource "aws_iam_role" "ecs_task_role" {
]
})
}
}

resource "aws_iam_role" "ecs_task_execution_role" {
name = "twiggy-ecs_task_execution_role"
path = "/service-role/"
assume_role_policy = data.aws_iam_policy_document.assume_role_policy_ecs_tasks.json
managed_policy_arns = [
"arn:aws:iam::aws:policy/service-role/AmazonECSTaskExecutionRolePolicy"
]
inline_policy {
name = "systems-manager-parameter-store-access"
policy = jsonencode({
Statement : [
{
Effect : "Allow",
Action : "ssm:GetParameter",
Resource : "arn:aws:ssm:eu-west-1:866826529066:discord-token"
Resource : "arn:aws:ssm:eu-west-1:866826529066:/twiggy/*"
}
]
})
}
}

resource "aws_iam_role" "ecs_task_execution_role" {
name = "twiggy-ecs_task_execution_role"
path = "/service-role/"
assume_role_policy = data.aws_iam_policy_document.assume_role_policy_ecs_tasks.json
managed_policy_arns = [
"arn:aws:iam::aws:policy/service-role/AmazonECSTaskExecutionRolePolicy"
]
}

resource "aws_iam_role" "lambda" {
name = "twiggy-lambda"
assume_role_policy = data.aws_iam_policy_document.assume_role_policy_lambda.json
Expand Down
54 changes: 54 additions & 0 deletions terraform/ssm.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,54 @@
resource "aws_ssm_parameter" "ssm_parameter_discord_token" {
name = "/twiggy/discord_token"
type = "SecureString"
value = "TODO"
lifecycle {
ignore_changes = [
value
]
}
}

resource "aws_ssm_parameter" "ssm_parameter_itad_token" {
name = "/twiggy/itad_token"
type = "SecureString"
value = "TODO"
lifecycle {
ignore_changes = [
value
]
}
}

resource "aws_ssm_parameter" "ssm_parameter_twitch_secret" {
name = "/twiggy/twitch_secret"
type = "SecureString"
value = "TODO"
lifecycle {
ignore_changes = [
value
]
}
}

resource "aws_ssm_parameter" "ssm_parameter_twitch_client_id" {
name = "/twiggy/twitch_client_id"
type = "SecureString"
value = "TODO"
lifecycle {
ignore_changes = [
value
]
}
}

resource "aws_ssm_parameter" "ssm_parameter_open_weather_token" {
name = "/twiggy/open_weather_token"
type = "SecureString"
value = "TODO"
lifecycle {
ignore_changes = [
value
]
}
}

0 comments on commit 7d15167

Please sign in to comment.